Who Am I? Secure Identity Registration on Distributed Ledgers
Sarah Azouvi Mustafa Al-Bassam Sarah Meiklejohn (University College London)
1
Who Am I? Secure Identity Registration on Distributed Ledgers Sarah - - PowerPoint PPT Presentation
Who Am I? Secure Identity Registration on Distributed Ledgers Sarah Azouvi Mustafa Al-Bassam Sarah Meiklejohn (University College London) 1 Cryptocurrencies 2 Cryptocurrencies Pseudonyms 2 Cryptocurrencies Pseudonyms tx(pk A pk B ) 2
1
2
2
Pseudonyms
tx(pkA pkB)
2
Pseudonyms
3
3
3
PKI
PKI Anonymous Credentials
PKI Anonymous Credentials Identity management on Blockchains
PKI Anonymous Credentials Identity management on Blockchains
PKI Anonymous Credentials Identity management on Blockchains
PKI Anonymous Credentials Identity management on Blockchains
PKI Anonymous Credentials Identity management on Blockchains
uPort
PKI Anonymous Credentials Identity management on Blockchains
uPort ChainAnchor
PKI Anonymous Credentials Identity management on Blockchains
uPort MIT Digital certificates ChainAnchor
Registration I’m Alice pk
5
pk Verification
6
I’m Alice pk pk
6
Registration Verification
6
I’m Alice pk pk
6
Registration Verification
7
I’m Alice pk pk
7
Passive verification
7
8
I’m Alice pk pk
8
Active verification
8
9
I’m Alice pk pk
9
Attribute integrity
9
9
I’m Alice pk pk
9
Attribute integrity
9
9
I’m Alice pk pk
9
Attribute integrity
9
pk
9
I’m Alice pk pk
9
Attribute integrity
9
pk
10
I’m Alice ? pk
Attribute privacy
11
12
Registration I’m Alice, my public key is pk tx{pkR (pk,pkrev)}
13
Registration I’m Alice, my public key is pk tx{(pkR1,…,pkRn) (pk,pkrev1,…,pkrevn)}
13
13
Registration I’m Alice, my public key is pk tx{(pkR1,…,pkRn) (pk,pkrev1,…,pkrevn)} Verification tx? pkrev?
13
14
But malicious coalition of users can collude
Alice + pk
14
But malicious coalition of users can collude
Alice + pk
15
16
pk1 sk1, pk1 sk2 sk2 pk2=pk1sk2 pk2=pk1sk2 =gsk1.sk2
17
17 17
18
18
registrar knows the private key.
19
20
https://github.com/musalbas/trustery
21
22
23
24